CVE-2024-38213: Copy2Pwn Exploit Evades Windows Web Protections (www.zerodayinitiative.com)
from BodaciousMunchkin@links.hackliberty.org to technology@lemmy.world on 20 Aug 2024 10:08
https://links.hackliberty.org/post/2459180

When a user downloads a file from an untrusted source such as the web, Windows adds the Mark-of-the-Web to the local copy of the file.

The presence of the Mark-of-the-Web triggers additional security checks and prompts when opening the file. This helps reduce the risk of executing untrusted content.

Unfortunately, threat actors have discovered that Windows does not always handle or properly apply the Mark-of-the-Web to files served over WebDAV.

Before the release of the Microsoft June security patch, files copied and pasted from WebDAV shares did not receive the Mark-of-the-Web designations. This meant that users might copy and paste files from a WebDAV share to their desktop, and those files could subsequently be opened without the protections of Windows Defender SmartScreen or Microsoft Office Protected View. In particular, this means that there would be no reputation or signature checks on executables.

#technology

threaded - newest

pHr34kY@lemmy.world on 20 Aug 2024 14:28 collapse

This sounds like an improvement, if anything. I know I’m opening a file I downloaded. I don’t need a warning. I need it to execute, because that’s the instruction I gave.

heydo@lemmy.world on 20 Aug 2024 15:06 collapse

Information security professionals hate this one trick…